Skip to content

A user-friendly command-line toolkit for WiFi network scanning, handshake capture, and vulnerability reporting—compatible with Termux (Android), Kali Linux, and WSL. For ethical hacking, learning, and authorized penetration testing only.

License

Notifications You must be signed in to change notification settings

trmxvibs/wifi-audit-tool

Repository files navigation

🛡️ WiFi Auditing Tool

GitHub Workflow Status Python Version License
GitHub last commit GitHub code size in bytes GitHub issues

A command-line toolkit designed for ethical hackers and network security enthusiasts using Kali Linux. This tool simplifies scanning WiFi networks, capturing handshakes, and generating crack commands through an easy-to-use, interactive menu.


Caution

🛑Disclaimer

This tool is intended for Authorized security testing ONLY.

Using this tool on networks without explicit, written permission from the owner is illegal. The developer is not responsible for any misuse or damage caused by this program. Use responsibly.


🚀 Key Features

  • Automatic Monitor Mode: Automatically enables and disables monitor mode on your wireless adapter.
  • Network Scanning: Scans for all nearby WiFi networks using airodump-ng.
  • WPA/WPA2 Handshake Capture: Easily targets a specific network (by BSSID and channel) to capture WPA/WPA2 handshakes.

🛠️ Installation

  1. Clone the repository:

    git clone https://github.com/trmxvibs/wifi-audit-tool.git
    cd wifi-audit-tool
  2. Make the install script executable:

    chmod +x install.sh
  3. Run the installer (this will use sudo to install dependencies):

    ./install.sh

⚡ Usage & Example Workflow

Always run the tool with sudo (root) privileges:

sudo python3 wifi_audit.py

⚠️ Troubleshooting & Common Errors

  • Error: "Error detecting interfaces: Command ['iw', 'dev'] returned non-zero exit status 1"

  • This is the most common error when running Kali Linux inside an Android/Termux environment (like Nethunter).

  • Cause: The Android OS security model blocks the Kali "guest" OS from directly accessing your phone's internal WiFi chip. The iw dev command cannot find any compatible hardware.

  • Solution: You cannot use your phone's built-in WiFi for this. You must use an external USB WiFi adapter.

Required Hardware:

  • OTG Adapter: A USB-C or Micro USB adapter to connect the USB adapter to your phone.

  • External WiFi Adapter: A USB WiFi adapter that is Kali-compatible and supports monitor mode (e.g., adapters with Atheros AR9271 or Ralink RT5370 chipsets).

About

A user-friendly command-line toolkit for WiFi network scanning, handshake capture, and vulnerability reporting—compatible with Termux (Android), Kali Linux, and WSL. For ethical hacking, learning, and authorized penetration testing only.

Topics

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published